CVE-2025-50180
esm.sh is vulnerable to full-response SSRF
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
esm.sh is a no-build content delivery network (CDN) for web development. In version 136, esm.sh is vulnerable to a full-response SSRF, allowing an attacker to retrieve information from internal websites through the vulnerability. Version 137 fixes the vulnerability.
| CWE | CWE-918 |
| Vendor | esm-dev |
| Product | esm.sh |
| Published | Feb 25, 2026 |
| Last Updated | Feb 27, 2026 |
Stay Ahead of the Next One
Get instant alerts for esm-dev esm.sh
Be the first to know when new unknown vulnerabilities affecting esm-dev esm.sh are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
esm-dev / esm.sh
= 136
References
github.com: https://github.com/esm-dev/esm.sh/security/advisories/GHSA-3c9r-837r-qqm4 github.com: https://github.com/esm-dev/esm.sh/pull/1149 github.com: https://github.com/esm-dev/esm.sh/commit/0593516c4cfab49ad3b4900416a8432ff2e23eb0 github.com: https://github.com/esm-dev/esm.sh/blob/f80ff8c8d58749e77fa964abde468fc61f8bd89e/internal/fetch/fetch.go#L13 github.com: https://github.com/esm-dev/esm.sh/blob/f80ff8c8d58749e77fa964abde468fc61f8bd89e/server/router.go#L511 github.com: https://github.com/esm-dev/esm.sh/releases/tag/v137